Method for Predicting and Detecting Network Intrusion in a Computer Network

a computer network and network intrusion detection technology, applied in the field of internet intrusion detection, can solve the problems of not being able to contain the attack features, too late for the network security system to act in order to protect computing, and increasing the number of internet attacks

Active Publication Date: 2015-06-04
MACAU UNIV OF SCI & TECH
View PDF23 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]There are many advantages in this present invention. Firstly, the present invention is capable to predict potential intrusion attack before the incoming network packet actually arrives. This allows the system or the computer device that this system protects to take immediate action to counter the attack. Secondly, as can be seen below, the look-ahead intrusion detection module performs very well in anomaly network packet detection.

Problems solved by technology

With the rise of internet use, numbers of internet attacks have also increased dramatically.
If it turns out to be a real threat, it may be too late for the network security system to act in order to protect the computing.
Since hackers continue to alter their attacks, some attacks may not contain the attack features that are known to the internet intrusion detection system and / or method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Predicting and Detecting Network Intrusion in a Computer Network
  • Method for Predicting and Detecting Network Intrusion in a Computer Network
  • Method for Predicting and Detecting Network Intrusion in a Computer Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]As used herein and in the claims, “comprising” means including the following elements but not excluding others.

[0015]FIG. 1 illustrates an internet intrusion detection system 200 for one embodiment of the present invention. The internet instruction detection system 200 is installed in between an internet connection between a computing device and the internet. As shown in FIG. 1, the internet intrusion detection system 200 comprises a features extractor module 34, a first in first out (FIFO) buffer 36, a current frame intrusion detection module 202 and a look-ahead intrusion detection module 204. The current frame intrusion detection module 202 further comprises a first classifier 38 and the look-ahead intrusion detection module 204 further comprises a predictor 40 and a second classifier 42. The internet intrusion detection system 200 at one end is connected to the internet 22, which transmits incoming network packets to the internet intrusion detection system 200. At the othe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of detecting an internet attack against a computing device is disclosed. The method of detecting an internet attack against a computing device comprising the steps of receiving a plurality of incoming network packets; extracting a plurality of incoming feature packets based on the plurality of incoming network packets; predicting a predicted incoming feature packet based on the plurality of incoming feature packets; obtaining a first classification data based on one of the incoming feature packets using a first classifier; obtaining a second classification data based on the predicted incoming feature packet by using a second classifier; and performing at least one remedy action if the first classification data or the second classification data identifies the internet intrusion attack; wherein each of the plurality of incoming feature packets and the predicted incoming feature packet comprise a plurality of incoming features and a plurality of predicted features respectively.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]The present application claims priority under 35 U.S.C. §119 to Innovation Australian Patent Application No. 2013-101573 filed on Nov. 29 2013. The content of the application is incorporated herein by reference in its entirety.FIELD OF INVENTION[0002]This invention relates to a method of detecting internet intrusion based on a predicted incoming feature packet.BACKGROUND OF INVENTION[0003]Our everyday activities rely heavily on the internet. For example, e-mail and e-commerce are all depended on the internet. Undoubtedly, the internet is now becoming more and more important to all of us. With the rise of internet use, numbers of internet attacks have also increased dramatically. As a result, network security has become increasingly important. A robust internet intrusion detection system is vital component to an effective network security system. Conventional internet intrusion detection system and / or method only check if an incoming networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441H04L63/20G06F21/55H04L63/1425H04L41/147H04L63/1416G06F21/552H04L41/149
Inventor CHI TIN, HONJIA HUA, XU
Owner MACAU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products